International Journal of Wireless Security & Network is a peer-reviewed hybrid open-access journal launched in 2015 devoted to solving your network security problems in specific detail. Journal covers a niche segment of information technology dealing only with wireless network security. Wireless network attacks, securing wireless transmissions, and securing wireless access points are major portions that are covered under the journal.


International Journal of Wireless Security & Networks

Journal Abbreviation


Issues Per Year

2 issues


STM Journals, An imprint of Consortium e-Learning Network Pvt. Ltd.




STM Journals, An imprint of Consortium e-Learning Network Pvt. Ltd.

Starting Year






Publication Format

Hybrid, and Open Access

Type of Publication

Peer-reviewed Journal (Refereed Journal)



STM Journals, An imprint of Consortium e-Learning Network Pvt. Ltd.
A-118, 1st Floor, Sector-63, Noida, U.P. India, Pin - 201301


Google Scholar,DRJI,Advanced Sciences Index

Refreed Journal

Focus and Scope

  • Wireless threats: Wireless sensor network, security threat, security issues, security attacks, Wireless networks, Data security, Information security, Principal component analysis, Internet, Mobile computing, Secure storage, Computer networks, Communication system security, Information analysis, Internet security, wireless network media, mobile storage, cable network environment, primary components analysis.

  • Signal-hiding: Differential power analysis, DPA,dual-rail logic styles, hardware security, information-theoretic metrics, randomization,side-channel signal hiding, worst-case security evaluation, noise emulation, masking side-channel attacks, algorithmic countermeasures, amplitude randomization techniques, masking security proofs,side-channel information leakage,side-channel signal hiding, signal hiding countermeasures, security tradeoff.

  • Wireless vulnerabilities: Wireless security, group decision support, collaborative, knowledge management, vulnerability scan wireless networks, Information security, Knowledge management, Communication system security, Collaboration, Risk management, Data Security, Network servers, Authorization, and Computer security.

  • Securing wireless transmissions: Data transmission, wireless mesh networks, wireless data dissemination, emergency services broadcasting, military communication, reliable data dissemination, wireless network, security attacks, network dynamics, hand-held receivers coding, security key management, mobile devices Relays, Wireless communication, Communication system security, Receivers, Network coding, Authentication.

  • Network auditing: Neural networks, auditing, audit risk assessment, real-world cases, Intelligent networks, Artificial neural networks, Marketing and sales, Risk management, Training data, Chromium, Law, Legal factors, and Information systems.

  • Wireless public key infrastructure: Wireless networks, Public key, Public key cryptography, Communication system security, Elliptic curve cryptography, Computer networks, Communication system control, Communication system operations, and management, Computer network management, Business communication computer networks, public key cryptography, radiocommunication, security of data, telecommunication security.

  • Electromagnetic shielding: Matrix multiplication approach, multiple cylindrical shells, Gaussian elimination, Helmholtz equations, boundary equations, low-frequency electromagnetic shielding, low-frequency electromagnetic scattering transients, electromagnetic shielding, electromagnetic fields, conducting bodies, electromagnetic interference.


Submission of Paper:

Manuscripts are invited from academicians, students, research scholars and faculties for publication consideration. Papers are accepted for editorial consideration through email :[email protected]

Plagiarism: All the articles will be check through Plagiarism Software before publication.  

Subject: Computer Science